AWS CloudWatch Events In Use
Ensure CloudWatch Events is in use to help you respond to operational changes within your AWS resources.
Addresses: Security, Reliability, Operational Maturity
Audit your Cloudwatch
Ensure CloudWatch Events is in use to help you respond to operational changes within your AWS resources.
Addresses: Security, Reliability, Operational Maturity
Ensure AWS Config configuration changes are being monitored using CloudWatch alarms.
Addresses: Security
Monitor for AWS Console Sign-In Requests Without MFA.
Addresses: Security
Ensure Amazon Organizations changes are being monitored using AWS CloudWatch alarms.
Addresses: Security
Ensure any unauthorized API calls made within your AWS account are being monitored using CloudWatch alarms.
Addresses: Security
Ensure AWS CMK configuration changes are being monitored using CloudWatch alarms.
Addresses: Security
Ensure all AWS CloudTrail configuration changes are being monitored using CloudWatch alarms.
Addresses: Security
Ensure your AWS Console authentication process is being monitored using CloudWatch alarms.
Addresses: Security
Ensure AWS EC2 instance changes are being monitored using CloudWatch alarms.
Addresses: Security
Ensure AWS EC2 large instance changes are being monitored using CloudWatch alarms.
Addresses: Security
Ensure AWS IAM policy configuration changes are being monitored using CloudWatch alarms.
Addresses: Security
Ensure AWS VPC Customer/Internet Gateway configuration changes are being monitored using CloudWatch alarms.
Addresses: Security
Ensure AWS Network ACLs configuration changes are being monitored using CloudWatch alarms.
Addresses: Security
Ensure Root Account Usage is being monitored using CloudWatch alarms.
Addresses: Security
Ensure AWS Route Tables configuration changes are being monitored using CloudWatch alarms.
Addresses: Security
Ensure AWS S3 Buckets configuration changes are being monitored using CloudWatch alarms.
Addresses: Security
Ensure AWS security groups configuration changes are being monitored using CloudWatch alarms.
Addresses: Security
Ensure AWS VPCs configuration changes are being monitored using CloudWatch alarms.
Addresses: Security
Ensure that your AWS CloudWatch event bus is not exposed to everyone.
Addresses: Security
Ensure that AWS CloudWatch event buses do not allow unknown cross-account access for delivery of events.
Addresses: Security
Ensure that a CloudWatch alarm is created for the VPC Flow Logs metric filter and an alarm action is configured.
Addresses: Security
Ensure that a log metric filter for the CloudWatch group assigned to the VPC Flow Logs is created.
Addresses: Security
If you are not yet convinced to sign up with Cloudanix, that's not a problem. We recommend you use a comprehensive checklist which your team can use to perform a manual assessment of your workload.